2010 Third International Conference on Dependability最新文献

筛选
英文 中文
Software-Implemented Fault Injection at Firmware Level 固件级软件实现的故障注入
2010 Third International Conference on Dependability Pub Date : 2010-07-18 DOI: 10.1109/DEPEND.2010.10
Peter Tröger, Felix Salfner, Steffen Tschirpke
{"title":"Software-Implemented Fault Injection at Firmware Level","authors":"Peter Tröger, Felix Salfner, Steffen Tschirpke","doi":"10.1109/DEPEND.2010.10","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.10","url":null,"abstract":"Software-implemented fault injection is an established method to emulate hardware faults in computer systems. Existing approaches typically extend the operating system by special drivers or change the application under test. We propose a novel approach where fault injection capabilities are added to the computer firmware. This approach can work without any modification to operating system and / or applications, and can support a larger variety of fault locations. We discuss four different strategies in X86/X64 and Itanium systems. Our analysis shows that such an approach can increase portability, the non-intrusiveness of the injector implementation, and the number of supported fault locations. Firmware-level fault injection paves the way for new research directions, such as virtual machine monitor fault injection or the investigation of certified operating systems.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126719327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Definition of Core Requirements and a Reference Architecture for a Dependable, Secure and Adaptive Distributed Monitoring Framework 可靠、安全、自适应分布式监控框架的核心需求定义与参考体系结构
2010 Third International Conference on Dependability Pub Date : 2010-07-18 DOI: 10.1109/DEPEND.2010.31
T. Kanstrén, R. Savola
{"title":"Definition of Core Requirements and a Reference Architecture for a Dependable, Secure and Adaptive Distributed Monitoring Framework","authors":"T. Kanstrén, R. Savola","doi":"10.1109/DEPEND.2010.31","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.31","url":null,"abstract":"This paper discusses different aspects of performing monitoring in the context of software intensive systems. The focus is especially on cases where the observed system is distributed, and the monitoring system needs to be secure, dependable and capable to adapt to a number of dynamic scenarios during the system evolution. Based on analysis of monitoring needs in this type of a domain, a set of core requirements for providing a monitoring framework for these domains are defined. To address these requirements, a high-level reference architecture for a monitoring framework is presented. Together these provide a basis for designing different monitoring frameworks.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123251545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Intrusion Tolerance Approach to Enhance Single Sign on Server Protection 一种增强单点登录服务器保护的入侵容忍方法
2010 Third International Conference on Dependability Pub Date : 2010-07-18 DOI: 10.1109/DEPEND.2010.23
David Pham, A. Sood
{"title":"An Intrusion Tolerance Approach to Enhance Single Sign on Server Protection","authors":"David Pham, A. Sood","doi":"10.1109/DEPEND.2010.23","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.23","url":null,"abstract":"Modern IT systems have evolved into complex distributed systems that support thousands of users, with each user requiring access to several applications. Single sign on (SSO) provides a convenient facility for managing user authentication such that a user only logs into a system once in order to gain access to many protected applications. For this reason it becomes vitally important to secure the SSO server. If an SSO server is compromised, it could potentially put many applications at risk at the same time. The current Intrusion Detection and Prevention systems have proven to be inadequate because the “bad guys” are always one step ahead. In this paper we present a new and innovative approach to SSO server security called “Self-Cleansing Intrusion Tolerance SSO” (SCIT). SCIT shifts the focus from detection and prevention to containing losses, by reducing the exposure time of the servers. Specifically, we present the results of an evaluation of the performance of a SCIT-ized SSO server. In this way we increase the dependability of the server and provide a new way to balance the trade-off between security and availability. We will show that SCIT provides increased security with little degradation in overall response time of the system.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"123 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132803913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Feature Specific Control Flow Checking in COTS-Based Embedded Systems 基于cots的嵌入式系统中功能特定控制流检查
2010 Third International Conference on Dependability Pub Date : 2010-07-18 DOI: 10.1109/DEPEND.2010.17
Amir Rajabzadeh, S. Miremadi
{"title":"Feature Specific Control Flow Checking in COTS-Based Embedded Systems","authors":"Amir Rajabzadeh, S. Miremadi","doi":"10.1109/DEPEND.2010.17","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.17","url":null,"abstract":"While the Control Flow Checking (CFC) methods are using the ordinary instruction set and general Arithmetic and Logic Unit (ALU) features to protect the programs against the transient faults, this paper presents a new kind of CFC method, called feature specific CFC. The idea behind this method is using a specific internal hardware in modern processors which provides the ability to monitor internal various parameters of the program. This method is a pure software method and the external hardware overhead is zero. Other overheads have been measured experimentally by executing the workloads on a Pentium system. The execution time overhead is between 42% and 67% and the program size overhead is between 5% and 10% for different workload programs. This method is analytically evaluated based on seven different fault models. The results show that the error detection coverage varies between 98.05% and 98.65% depending on the different workload programs.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130926386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dependability of a Network Monitoring Hardware 网络监控硬件的可靠性
2010 Third International Conference on Dependability Pub Date : 2010-07-18 DOI: 10.1109/DEPEND.2010.14
Sándor Plósz, I. Moldován, P. Varga, László Kántor
{"title":"Dependability of a Network Monitoring Hardware","authors":"Sándor Plósz, I. Moldován, P. Varga, László Kántor","doi":"10.1109/DEPEND.2010.14","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.14","url":null,"abstract":"System dependability plays an important role in the realization of computer communication infrastructures and the everyday operations and maintenance of computer networks. Increased redundancy is used as a common practice to improve dependability, however in some cases duplication of a networking equipment is not desirable due to high cost or increased system complexity as a result of handling potentially duplicated data. In such cases a single point of failure exists. In this paper we first present a highly dependable networking hardware architecture and demonstrate its application in a monitoring example then we provide a detailed dependability analysis for the hardware used in monitoring application.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131833152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Modelling and Analysis of Dynamic Reconfiguration of Dependable Real-Time Systems 可靠实时系统动态重构建模与分析
2010 Third International Conference on Dependability Pub Date : 2010-07-18 DOI: 10.1109/DEPEND.2010.33
M. Mazzara, Anirban Bhattacharyya
{"title":"On Modelling and Analysis of Dynamic Reconfiguration of Dependable Real-Time Systems","authors":"M. Mazzara, Anirban Bhattacharyya","doi":"10.1109/DEPEND.2010.33","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.33","url":null,"abstract":"This paper motivates the need for a formalism for the modelling and analysis of dynamic reconfiguration of dependable real-time systems. We present requirements that the formalism must meet, and use these to evaluate well-established formalisms and two process algebras that we have been developing, namely, Webpi and CCSdp. A simple case study is developed to illustrate the modelling power of these two formalisms. The paper shows how Webpi and CCSdp represent a significant step forward in modelling adaptive and dependable real-time systems.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131091113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
From Formal Specification in Event-B to Probabilistic Reliability Assessment 从事件b的形式化规范到概率可靠性评估
2010 Third International Conference on Dependability Pub Date : 2010-07-18 DOI: 10.1109/DEPEND.2010.12
A. Tarasyuk, E. Troubitsyna, L. Laibinis
{"title":"From Formal Specification in Event-B to Probabilistic Reliability Assessment","authors":"A. Tarasyuk, E. Troubitsyna, L. Laibinis","doi":"10.1109/DEPEND.2010.12","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.12","url":null,"abstract":"Formal methods, in particular the B Method and its extension Event-B, have proven their worth in the development of many complex software-intensive systems. However, while providing us with a powerful development platform, these frameworks poorly support quantitative assessment of dependability attributes. Yet, such an assessment would facilitate not only system certification but also system development by guiding it towards the design optimal from the dependability point of view. In this paper we demonstrate how to integrate reliability assessment performed by model checking into refinement process in Event-B. Such an integration allows us to combine logical reasoning about functional correctness with probabilistic reasoning about reliability. Hence we obtain a method that enables building the systems that are not only correct-by-construction but also have a predicted level of reliability.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132091294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effective Data Dissemination for Large-Scale Complex Critical Infrastructures 大规模复杂关键基础设施的有效数据传播
2010 Third International Conference on Dependability Pub Date : 2010-07-18 DOI: 10.1109/DEPEND.2010.18
C. Esposito, C. Martino, M. Cinque, Domenico Cotroneo
{"title":"Effective Data Dissemination for Large-Scale Complex Critical Infrastructures","authors":"C. Esposito, C. Martino, M. Cinque, Domenico Cotroneo","doi":"10.1109/DEPEND.2010.18","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.18","url":null,"abstract":"Large-scale complex infrastructures are emerging as new computing platforms for the federation of world-wide mission critical systems over the Internet. However, standard approaches to data dissemination are still not adequate to the scale of these systems. The best-effort delivery guarantees of the Internet and the occurrence of node failures may compromise the correct and timely delivery of data, and hence the mission of the overall infrastructure. This paper presents a peer-to-peer approach for resilient and scalable data dissemination over large-scale complex critical infrastructures. The approach is based on the adoption of epidemic dissemination algorithms between peer groups, combined with the semi-active replication of group leaders. The effectiveness of the approach is shown by means of extensive simulation experiments, based on Stochastic Activity Networks. Results demonstrate that the use of epidemic algorithms over peer-to-peer overlays can achieve a 5 nines (99.999%) resiliency level, compared to the 3 nines (99.9%) of the standard solution.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116052772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Randomized Consensus in Wireless Environments: A Case Where More is Better 无线环境中的随机共识:多多益善
2010 Third International Conference on Dependability Pub Date : 2010-07-18 DOI: 10.1109/DEPEND.2010.9
Bruno Vavala, N. Neves, Henrique Moniz, P. Veríssimo
{"title":"Randomized Consensus in Wireless Environments: A Case Where More is Better","authors":"Bruno Vavala, N. Neves, Henrique Moniz, P. Veríssimo","doi":"10.1109/DEPEND.2010.9","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.9","url":null,"abstract":"In many emerging wireless scenarios, consensus among nodes represents an important task that must be accomplished in a timely and dependable manner. However, the sharing of the radio medium and the typical communication failures of such environments may seriously hinder this operation. In the paper, we perform a practical evaluation of an existing randomized consensus protocol that is resilient to message collisions and omissions. Then, we provide and analyze an extension to the protocol that adds an extra message exchange phase. In spite of the added time complexity, the experiments confirm that our extension and some other implementation heuristics non-trivially boost the speed to reach consensus. Furthermore, we show that the speed-up holds also under particularly bad network conditions. As a consequence, our contribution turns out to be a viable and energy-efficient alternative for critical applications.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128582910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Estimating Reliability of Mobile Agent System for Mobile Ad Hoc Networks 移动Ad Hoc网络中移动代理系统的可靠性评估
2010 Third International Conference on Dependability Pub Date : 2010-07-18 DOI: 10.1109/DEPEND.2010.15
C. Chowdhury, S. Neogy
{"title":"Estimating Reliability of Mobile Agent System for Mobile Ad Hoc Networks","authors":"C. Chowdhury, S. Neogy","doi":"10.1109/DEPEND.2010.15","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.15","url":null,"abstract":"A mobile agent is a particular type of agent with the ability to migrate from one host to another where it can resume its execution. Mobile agents can be used in applications for wireless network to save bandwidth and time. In this paper we consider dependability aspect, especially reliability issues that need to be addressed before the mobile agents can be used for a broad range of commercial applications in mobile adhoc network (MANET). The MANET introduces new aspects to dependability affecting reliability of the services of the mobile agent based system. In this paper, we propose an algorithm for estimating the task route reliability of mobile agent systems (MAS), which are based on the conditions of the underlying wireless network. The agents can select their route dynamically. The complexity of mobile agent network systems makes it hard to obtain the route reliability of the MAS theoretically; instead we estimate it using Monte Carlo simulation. In this paper, we assume that the MAS consist of a number of independent mobile agents operating simultaneously. The paper estimates the reliability of mobile agent system considering different failures of the underlying network. The results achieved demonstrate the robustness of the proposed algorithm. This paper demonstrates a reliability estimation model for MAS in MANET and shows that reliability is almost independent on the no. of agents (for higher no. of agents) or no. of mobile nodes but highly dependent on the condition of the links especially on the connectivity of the graph.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134463935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信